Preferred Language
Articles
/
bijps-1627
Comparison of Phenolic Contents and Antioxidant Activities for Black and White Desert Truffles Spread in Syria
...Show More Authors

Desert truffle is considered as a type of Syrian wild fungi that spreads heavily, and it occupies important rank in folk medicine, where its aqueous extract is used for the treatment of some eye and skin illnesses, and people prefer the use of black truffle. This work interested in studying of the most available species; Terfezia claveryi (black) and Tirmania pinoyi (white). The extracts of the two species of truffle were prepared by maceration with water, methanol, and ethanol 70%. Their total phenolic contents (TPC) and total flavonoid contents (TFC) were analyzed using Folin-ciocalteu and Aluminum chloride methods respectively, and their antioxidant activities was tested using 2,2-diphenyl-1-picrylhydrazyl (DPPH) and Ferric Reducing Antioxidant Power (FRAP) methods, after microscopic examination and detection of phytochemical components. Then, phenolic profile of ethanolic 70% extract of black truffle T.claveryi was studied by using LC-MS/MS. The values of TPC were between 25.3-43.6 mg GAE/g dry extract and TFC were between 2.5-6.8 mg QE/g dry extract. The values of DPPH (IC50) and FRAP were between 5.6-9.0 mg/ml and 90.1-153.4 µmol AAE/g dry extract respectively. There is a great similarity in content and activity of two species, also the aqueous extract is similar to other extracts in content and activity, and this means that the method of extract preparation in traditional medicine is reliable. It has been predicted about 14 phenolic compounds in the extract; as p-Hydroxy benzoic acid, Syringic acid and trans-Cinnamic acid. As a result, both truffle species are a new rich resource of antioxidant compounds which are usable in nutritional, cosmetic, and therapeutic applications.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 05 2018
Journal Name
International Journal Of Science And Research (ijsr)
Image Steganography Based on Discrete Wavelet Transform and Chaotic Map, IJSR, Call for Papers, Online Journal
...Show More Authors

'Steganography is the science of hiding information in the cover media', a force in the context of information sec, IJSR, Call for Papers, Online Journal

View Publication
Publication Date
Sun Sep 01 2019
Journal Name
Gazi University Journal Of Science
Reliable Iterative Methods for Solving Convective Straight and Radial Fins with Temperature-Dependent Thermal Conductivity Problems
...Show More Authors

In our article, three iterative methods are performed to solve the nonlinear differential equations that represent the straight and radial fins affected by thermal conductivity. The iterative methods are the Daftardar-Jafari method namely (DJM), Temimi-Ansari method namely (TAM) and Banach contraction method namely (BCM) to get the approximate solutions. For comparison purposes, the numerical solutions were further achieved by using the fourth Runge-Kutta (RK4) method, Euler method and previous analytical methods that available in the literature. Moreover, the convergence of the proposed methods was discussed and proved. In addition, the maximum error remainder values are also evaluated which indicates that the propo

... Show More
View Publication
Crossref (6)
Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
Developing Load Balancing for IoT - Cloud Computing Based on Advanced Firefly and Weighted Round Robin Algorithms
...Show More Authors

The evolution of the Internet of things (IoT) led to connect billions of heterogeneous physical devices together to improve the quality of human life by collecting data from their environment. However, there is a need to store huge data in big storage and high computational capabilities.   Cloud computing can be used to store big data.  The data of IoT devices is transferred using two types of protocols: Message Queuing Telemetry Transport (MQTT) and Hypertext Transfer Protocol (HTTP). This paper aims to make a high performance and more reliable system through efficient use of resources. Thus, load balancing in cloud computing is used to dynamically distribute the workload across nodes to avoid overloading any individual r

... Show More
View Publication Preview PDF
Scopus (31)
Crossref (15)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2020
Journal Name
Medico-legal Update
Knowledge and protective health behaviors concerning risk factors for coronary heart disease among baghdad university students
...Show More Authors

Scopus (13)
Scopus
Publication Date
Fri Mar 04 2022
Journal Name
Environmental Science And Pollution Research
Geographically weighted regression model for physical, social, and economic factors affecting the COVID-19 pandemic spreading
...Show More Authors
Abstract<p>This study aims to analyze the spatial distribution of the epidemic spread and the role of the physical, social, and economic characteristics in this spreading. A geographically weighted regression (GWR) model was built within a GIS environment using infection data monitored by the Iraqi Ministry of Health records for 10 months from March to December 2020. The factors adopted in this model are the size of urban interaction areas and human gatherings, movement level and accessibility, and the volume of public services and facilities that attract people. The results show that it would be possible to deal with each administrative unit in proportion to its circumstances in light of the factors that appe</p> ... Show More
View Publication Preview PDF
Scopus (14)
Crossref (13)
Scopus Clarivate Crossref
Publication Date
Wed May 10 2017
Journal Name
Australian Journal Of Basic And Applied Sciences
Block-based Image Steganography for Text Hiding Using YUV Color Model and Secret Key Cryptography Methods
...Show More Authors

Preview PDF
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
AlexNet Convolutional Neural Network Architecture with Cosine and Hamming Similarity/Distance Measures for Fingerprint Biometric Matching
...Show More Authors

In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Synthesis, Characterization and Antimicrobial Evaluation for New Esters Derivatives Containing Two 1, 3, 4-Oxadiazole Units
...Show More Authors

     This work includes the synthesis of new ester compounds containing two 1,3,4-oxadiazole rings, 15a-c and 16a-c. This was done over seven steps, starting with p-acetamido-phenol 1 and 2-mercaptobenzoimidazole 2. The structure of the products was determined using FT-IR, 1H NMR, and mass spectroscopy. The evaluation of the antimicrobial activities of some prepared compounds was achieved against four types of bacteria (two types of gram-positive bacteria; Staphylococcus aureus and Bacillus subtilis, and two types of gram-negative bacteria, Pseudomonas aeruginosa and E. Coli), as well as against one types of fungus (C. albino). The results show moderate activit against the study bacteria, and the theoretical analysis of the toxi

... Show More
View Publication
Scopus (7)
Crossref (6)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Ieee Access
Wrapper and Hybrid Feature Selection Methods Using Metaheuristic Algorithms for English Text Classification: A Systematic Review
...Show More Authors

Feature selection (FS) constitutes a series of processes used to decide which relevant features/attributes to include and which irrelevant features to exclude for predictive modeling. It is a crucial task that aids machine learning classifiers in reducing error rates, computation time, overfitting, and improving classification accuracy. It has demonstrated its efficacy in myriads of domains, ranging from its use for text classification (TC), text mining, and image recognition. While there are many traditional FS methods, recent research efforts have been devoted to applying metaheuristic algorithms as FS techniques for the TC task. However, there are few literature reviews concerning TC. Therefore, a comprehensive overview was systematicall

... Show More
View Publication Preview PDF
Scopus (57)
Crossref (51)
Scopus Clarivate Crossref
Publication Date
Thu Jun 01 2017
Journal Name
Nuclear Physics A
Alpha-cluster preformation factor within cluster-formation model for odd-A and odd–odd heavy nuclei
...Show More Authors

View Publication
Scopus (52)
Crossref (52)
Scopus Clarivate Crossref